Security & IntelligenceAnswer Key

Counterintelligence Awareness Training For The Homeland Security Enterprise

12 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Personnel who fail to report CI Activities of concern as outlines in Enclosure 4 of DoD Directive 5240.06 are subject to appropriate disciplinary action under regulations

ANSWER

True

QUESTION 2

Cyber Vulnerabilities to DoD Systems may include:

ANSWER

All of the above

QUESTION 3

DoD personnel who suspect a coworker of possible espionage should:

ANSWER

Report directly to your CI or Security Office

QUESTION 4

Under DoDD 5240.06 Reportable Foreign Intelligence Contacts, Activities, Indicators and Behaviors; which of the following is not reportable?

ANSWER

None of the above

QUESTION 5

Potential espionage indicators (PEIs) are activities, behaviors, or circumstances that 'may be indicative' of potential espionage activities by an individual who may have volunteered or been recruited by a foreign entity as a writing espionage agent. Examples of PEI include:

ANSWER

All of the above

QUESTION 6

Foreign Intelligence Entity (FIE) is defined in DoD Directive 5240.06 as "any known or suspected foreign organization, person, or group (public, private, or governmental) that conducts intelligence activities to acquire U.S. information, block or impair U.S. intelligence collection, influence U.S. policy, or disrupt U.S. systems and programs. The term includes foreign intelligence and security services and international terrorists."

ANSWER

True

QUESTION 7

Counterintelligence as defined in the National Security Act of 1947, is "information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted by or on behalf of foreign governments or elements thereof, foreign organizations or foreign persons, or international terrorist activities."

ANSWER

True

QUESTION 8

If you feel you are being solicited for information which of the following should you do?

ANSWER

All of the Above

QUESTION 9

Foreign Intelligence Entities seldom use the Internet or other communications including social networking services as a collection method

ANSWER

False

QUESTION 10

Foreign Intelligence Entities seldom use elicitation to extract information from people who have access to classified or sensitive information

ANSWER

False

QUESTION 11

Collection Methods or operation frequently used by Foreign Intelligence Entities to collect information from DoD on the critical technology being produced within the cleared defense contractor facilities we support include:

ANSWER

All of the above

QUESTION 12

Which of the following is not an example of an anomaly?

ANSWER

Foreign diplomat attempts to defect.

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials